EXTENSIBLE CONFIGURATION SYSTEM TO ALLOW A WEBSITE TO AUTHENTICATE USERS BASED ON AN AUTHORIZATION PROTOCOL
2 Assignments
0 Petitions
Accused Products
Abstract
An extensible configuration system to allow a website to authenticate users based on an authorization protocol is disclosed. In some embodiments, the extensible configuration system includes receiving an identifier for an authentication provider; and automatically configuring a website to use the authentication provider for logging into the website.
2 Citations
40 Claims
-
1-20. -20. (canceled)
-
21. A computer-implemented method for configuring a web site to authenticate users based on authentication providers, the computer-implemented method comprising:
-
generating, at a web authoring platform hosting the web site, an application configured to connect the web site with an authentication provider; receiving, at the web authoring platform, an application identifier of the application and a secret associated with the authentication provider; and generating, at the web authoring platform, a web page of the web site, the web page configured to login a user based on a user login identity and a password corresponding to an account of the user with the authentication provider, wherein logging the user into the web page comprises; providing the application identifier, the secret, the user login identity, and the password to the authentication provider, and receiving an authentication of the user from the authentication provider based on the application identifier, the secret, the user login identity, and the password. - View Dependent Claims (22, 23, 24, 25, 26, 27)
-
-
28. A computer system, comprising:
-
a processor; and a memory comprising computer readable instructions that, when executed with the processor, cause the system to provide a web authoring platform, wherein the web authoring platform is configured to; generate an application configured to connect a web site with an authentication provider; receive an application identifier of the application and a secret associated with the authentication provider; and generate a web page of the web site, the web page configured to login a user based on a user login identity and a password corresponding to an account of the user with the authentication provider, wherein logging the user into the web page comprises; providing the application identifier, the secret, the user login identity, and the password to the authentication provider, and receiving an authentication of the user from the authentication provider based on the application identifier, the secret, the user login identity, and the password. - View Dependent Claims (29, 30, 31, 32, 33, 34, 35, 36)
-
-
37. A computer-implemented method for configuring a web site to authenticate users based on authentication providers, the computer-implemented method comprising:
-
generating, at a web authoring platform, an application configured to connect the web site with an authentication provider; receiving, at the web authoring platform, an application identifier of the application and a secret associated with the authentication provider; and generating, at the web authoring platform, an authentication service based on the application, the authentication service configured to authenticate the user to access a portion of the web site based on providing the application identifier and the secret to the authentication provider and receiving an authentication of the user from the authentication provider. - View Dependent Claims (38, 39, 40)
-
Specification